Академический Документы
Профессиональный Документы
Культура Документы
KE6900 / KE6940
User Manual
www.aten.com
FCC, CE Information
FEDERAL COMMUNICATIONS COMMISSION INTERFERENCE
STATEMENT: This equipment has been tested and found to comply with the
limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These
limits are designed to provide reasonable protection against harmful
interference when the equipment is operated in a commercial environment.
This equipment generates, uses, and can radiate radio frequency energy and, if
not installed and used in accordance with the instruction manual, may cause
harmful interference to radio communications. Operation Matrix Managerof
this equipment in a residential area is likely to cause harmful interference in
which case the user will be required to correct the interference at his own
expense.
FCC Caution: Any changes or modifications not expressly approved by the
party responsible for compliance could void the user's authority to operate this
equipment.
CE Warning: This is a class A product. In a domestic environment this product
may cause radio interference in which case the user may be required to take
adequate measures.
RoHS
This product is RoHS compliant.
SJ/T 11364-2006
The following contains information that relates to China.
ii
User Information
Online Registration
Be sure to register your product at our online support center:
International
http://eservice.aten.com
Telephone Support
For telephone support, call this number:
International
886-2-8692-6959
China
86-10-5255-0110
Japan
81-3-5615-5811
Korea
82-2-467-6789
North America
United Kingdom
44-8-4481-58923
User Notice
All information, documentation, and specifications contained in this manual
are subject to change without prior notification by the manufacturer. The
manufacturer makes no representations or warranties, either expressed or
implied, with respect to the contents hereof and specifically disclaims any
warranties as to merchantability or fitness for any particular purpose. Any of
the manufacturer's software described in this manual is sold or licensed as is.
Should the programs prove defective following their purchase, the buyer (and
not the manufacturer, its distributor, or its dealer), assumes the entire cost of all
necessary servicing, repair and any incidental or consequential damages
resulting from any defect in the software.
The manufacturer of this system is not responsible for any radio and/or TV
interference caused by unauthorized modifications to this device. It is the
responsibility of the user to correct such interference.
The manufacturer is not responsible for any damage incurred in the operation
of this system if the correct operational voltage setting was not selected prior
to operation. PLEASE VERIFY THAT THE VOLTAGE SETTING IS
CORRECT BEFORE USE.
iii
Package Contents
Basic Package
The basic KE6900 / KE6940 package consists of:
1 KE6900T / KE6940T DVI KVM Over IP Extender
1 KE6900R / KE6940R DVI KVM Over IP Extender
2 Power Adapters
1 USB KVM Cable
1 DVI-D Cable 2m (KE6940 only)
1 Mounting Kits
1 User Instructions*
Check to make sure that all of the components are present and in good order.
If anything is missing, or was damaged in shipping, contact your dealer.
Read this manual thoroughly and follow the installation and operation
procedures carefully to prevent any damage to the switch or to any other
devices on the KE6900 / KE6940 installation.
* Features may have been added to the KE6900 / KE6940 since this manual
was published. Please visit our website to download the most up-to-date
version.
iv
Contents
FCC, CE Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
SJ/T 11364-2006. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii
User Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .iii
Online Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .iii
Telephone Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .iii
User Notice . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .iii
Package Contents. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv
Basic Package. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv
About This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Product Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
Chapter 1.
Introduction
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
KE6900T (Transmitter) Front View . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
KE6900T (Transmitter) Rear View . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
KE6900R (Receiver) Front View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
KE6900R (Receiver) Rear View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
KE6940T (Transmitter) Front View . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
KE6940T (Transmitter) Rear View . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
KE6940R (Receiver) Front View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
KE6940R (Receiver) Rear View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Chapter 2.
Hardware Setup
Rack Mounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Wall Mounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Setting Up a Point-to-Point Installation . . . . . . . . . . . . . . . . . . . . . . . . 16
Point-to-Point Installation 1 of 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Point-to-Point Installation 2 of 2. . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Setting Up a LAN Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Network Installation Diagram 1 of 2 . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Network Installation Diagram 2 of 2. . . . . . . . . . . . . . . . . . . . . . . . 22
Network Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Return . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Default IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Chapter 3.
OSD Operation
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
LED Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Invoking the OSD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
OSD Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
User Station Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Transmitter Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
User Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Connecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Connections Page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Profile Page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Chapter 4.
Chapter 5.
Browser Operation
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Logging In . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
The Matrix Manager Main Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Web Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Tree View Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
The Tab Bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Chapter 6.
Dashboard
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Active Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Active Sessions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Online User Stations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Online Transmitters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Latest Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
vi
Chapter 7.
Device Management
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
User Stations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Adding a User Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Configuring a User Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Deleting a User Station . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Rx Video Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Hardware Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Adding an Rx Video Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Transmitters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Adding a Transmitter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Configuring a Transmitter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Deleting a Transmitter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Target Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Targets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Adding a Target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Target Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Adding a Target Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Adding a Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Chapter 8.
User Management
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Adding Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Modifying User Accounts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Deleting User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Creating Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Modifying Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Deleting Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Users and Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Assigning Users to a Group From the Users Notebook . . . . . . . . . . . 91
Removing Users From a Group From the Users Notebook . . . . . . . . 92
Assigning Users to a Group From the Groups Notebook . . . . . . . . . . 93
Removing Users From a Group From the Groups Notebook . . . . . . . 94
Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Assigning Device Permissions From the Users Notebook . . . . . . . . . 95
Assigning Device Permissions From the Groups Notebook . . . . . . . . 97
Chapter 9.
System
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Global Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
vii
ANMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Event Destination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Authentication & Authorization . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Redundancy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Chapter 10.
Logs
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
System Log. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Chapter 11.
Maintenance
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Backup / Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Firmware Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Firmware Upgrade Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Private Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Certificate Signing Request . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Chapter 12.
Appendix
Safety Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Rack Mounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Technical Support. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
International . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
North America . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
IP Installer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Trusted Certificates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Self-Signed Private Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Importing the Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Limited Warranty. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
viii
ix
Conventions
This manual uses the following conventions:
Monospaced
[]
1.
Product Information
For information about all ALTUSEN products and how they can help you
connect without limits, visit ALTUSEN on the Web or contact an ALTUSEN
Authorized Reseller. Visit ALTUSEN on the Web for a list of locations and
telephone numbers:
International
http://www.aten.com
North America
http://www.aten-usa.com
xi
xii
Chapter 1
Introduction
Overview
The KE6900 / KE6940 DVI KVM Over IP Extender is an IP based matrix
extender that allows access to a computer system from a remote USB KVM
console anywhere over a LAN. The KE6900 series is a single view extender
that supports one DVI display at each end. The KE6940 series is a dual view
extender that supports two DVI displays at each end, allowing the video output
to display across two monitors.
The KE6900 / KE6940 consists of a transmitter that connects to the computer
and a receiver that provides console access from a separate location. The
computer is accessed from the remote console via a standard TCP/IP network
or direct Ethernet cable connection. This is perfect for any installation where
you need to place the console where it is convenient, but you want the
computer to reside in a secure location - away from the keyboard, mouse and
display.
As a matrix extender it can connect one or more: computers-to-consoles in
several ways: one-to-one (Extender mode), one-to-many (Splitter mode),
many-to-one (Switch mode), or many-to-many (Matrix mode).
The KE6900 / KE6940 has a local On Screen Display (OSD) on the receiver to
configure both units - for easy setup and operation. Using the transmitter and
receiver over a standard TCP/IP network (optional) via Cat 5e cable allows
point-to-point, point-to-multipoint, and multipoint-to-multipoint
administration without needing a KVM switch. Both the transmitter and
receiver have RS-232 ports to connect to a serial terminal for configuration or
serial devices such as touchscreens and barcode scanners.
The Matrix Manager software provides advanced features for username and
password authentication, auto-detection of devices on the same LAN segment,
management of devices, and setup of Splitter, Switch, and Matrix modes. New
security features also provide extra protection with remote login security, a
username and password can be required when the receiver connects to the
transmitter.
With the OSD, network access, RS-232 port, software administration, and
Auto MDIX, the KE6900 / KE6940 is the most cost-effective and convenient
way to get a full digital extension from anywhere on the LAN.
Features
Remote KVM console access of computers over LAN or Ethernet cable
connection
Dual console operation control your system from both the Transmitter
and Receiver by USB keyboard, monitor, and mouse
RS-232 serial ports1 allows you to connect to a serial terminal for
configuration, and serial devices such as touchscreens and barcode
scanners
Superior video quality up to 1920 x 1200 @ 60 Hz; 24-bit color depth
Supports standard VGA resolutions from 640 x 480 to 1920 x 1200 at
60Hz
OSD (On Screen Display) on the Receiver configures both units
Supports AP GUI operation
Supports Web GUI2 administration
Remote login security
DVI digital and analog monitor support
Built-in ESD protection and surge protection
Supports stereo speakers and microphone
Auto-MDIX - automatically detects cable type
Supports widescreen formats
Supports High-Quality Video streaming
Virtual Media Support
Hot pluggable
Rack Mountable
Upgradeable firmware
Note: 1. RS-232 serial ports support Tx/Rx/CTS/RTS/DTR/DSR signals only.
2. The Matrix Manager web GUI can be downloaded from the ATEN
website (www.aten.com).
Chapter 1. Introduction
Requirements
Console
(KE6900) One DVI compatible monitors capable of the highest possible
resolution
(KE6940) Two DVI compatible monitors capable of the highest possible
resolution
A USB mouse
A USB keyboard
Microphone and speakers
Computers
The following equipment must be installed on each computer that is to be
connected to the system:
(KE6900) One DVI port
(KE6940) Two DVI ports
USB Type A port
Audio ports
Cables
For optimal signal integrity and to simplify the setup, we strongly
recommend that you only use the high quality custom USB KVM Cable
that is provided with this package.
Software
The minimum hardware and software requirements for the computer running
the Matrix Manager software are:
Processor: Intel or AMD processor 1 GHz or above
RAM: 2GB or above
HDD: 16GB or above
Web browser
Java Runtime Environment (JRE) 6 with update 11 or higher
Operating Systems
Supported operating systems are shown in the table, below:
OS
Windows
Linux
UNIX
Novell
Mac
Version
2000 and higher
RedHat
SuSE
Mandriva (Mandrake)
AIX
FreeBSD
Sun
Netware
Chapter 1. Introduction
Components
KE6900T (Transmitter) Front View
1
No.
Component
Description
KVM Ports
RS-232 Port
Audio Ports
1
No.
4
Component
8
Description
Power Jack
Function Switch
Reset
RS-232 Port
Audio Ports
Console Ports
LAN Port
DVI-I Output
Chapter 1. Introduction
POWER
LAN
REMOTE
LOCAL
Graphics
5
No.
Component
OSD
Video
Description
Power LED
LAN LED
Local LED
Remote LED
Graphics Pushbutton
OSD Pushbutton
Video Pushbutton
USB Port
1
No.
Component
9
Description
Power Jack
Function Switch
Reset
RS-232 Port
Audio Ports
USB Port
Console Ports
LAN Port
DVI-I Output
Chapter 1. Introduction
1
No.
Component
Description
KVM Ports
RS-232 Port
Audio Ports
1
No.
Component
8
Description
Power Jack
Function Switch
Reset
10
RS-232 Port
Audio Ports
Console Ports
LAN Port
DVI-I Output
Chapter 1. Introduction
POWER
LAN
REMOTE
LOCAL
Graphics
5
No.
Component
OSD
Video
Description
Power LED
LAN LED
Local LED
Remote LED
Graphics Pushbutton
OSD Pushbutton
Video Pushbutton
USB port
11
1
No.
Component
9
Description
Power Jack
Function Switch
Reset
RS-232 Port
Audio Ports
USB Port
12
Console Ports
LAN Port
DVI-I Output
Chapter 2
Hardware Setup
Rack Mounting
For convenience and flexibility, the Transmitter can be mounted on system
racks. To rack mount a unit do the following:
1. Using the screws provided in the Mounting Kit, screw the mounting
bracket into the bottom of the Transmitter as show in the diagram below:
Phillips hex head
M3 x 8
13
Note: These screws are not provided. We recommend that you use M5 x 12
Phillips Type I cross recessed type screws.
14
Wall Mounting
For convenience the Transmitter can be mounted to a wall.
1. Using the screws provided in the Mounting Kit, screw the mounting
bracket into the bottom of the Transmitter as show in the diagram below:
Phillips hex head
M3 x 8
2. Use the center hole to screw the bracket to a secure wall surface.
15
16
Point-to-Point Installation 1 of 2
Cat 5e cable
5
KE6900T
Cat 5e cable
8
KE6900R
Note: The diagram above shows the KE6900T and KE6900R. The KE6940
installation is the same except that an additional DVI monitor can be
connected at each end for a dual-view display setup.
17
Point-to-Point Installation 2 of 2
KE6900T
4
2
Local PC
USB KVM
cable
Note: The serial port on the Transmitter (shown above) connects to the
computer; the serial port on the Receiver (not shown) connects to a
serial device (optional).
18
19
5. Use a Cat 5e cable to connect the KE6900T / KE6940Ts LAN port to the
local area TCP/IP network.
6. Plug the power adapter into an AC source; and plug the other end into the
KE6900T / KE6940Ts Power Jack.
7. On the Receiver side, plug the mouse, keyboard, DVI monitor,
microphone, and speakers into the ports on the Console section of the
KE6900R / KE6940R*.
8. Use a Cat 5e cable to connect the KE6900R / KE6940Rs LAN port to the
local area TCP/IP network.
9. Plug the second power adapter into an AC source; and plug the other end
into the KE6900R / KE6940R's Power Jack.
10. Use the OSD on the Receiver to configure the network settings for both
devices (See Network Configuration, page 23).
11. Repeat these steps for each Transmitter and Receiver you wish to install on
the network.
12. Power on the computer(s).
Note: 1. If installing the KE6940 with two DVI monitors, connect the second
DVI monitor and KVM DVI cable into the additional ports on the
KE6940 and computer.
2. A keyboard or mouse with special functions may need to use the USB
ports for advanced features to work (see USB Mode, page 62).
20
5
KE6900T
TCP/IP
LAN
Cat 5e cable
8
KE6900R
Note: The diagram above shows the KE6900T and KE6900R. The KE6940
installation is the same except that an additional DVI monitor can be
connected at each end for a dual-view display setup.
21
4
2
Local PC
USB KVM
cable
Note: The serial port on the Transmitter (shown above) connects to the
computer; the serial port on the Receiver (not shown) connects to a
serial device (optional).
22
Network Configuration
This section provides instructions to configure the network settings with a
fixed IP address, subnet mask, and default gateway. To use the IP Installer to
configure the IP address, see IP Installer, page 137.
Note: 1. Both devices are preconfigured with factory-default network settings.
If you install only one set of KE6900 / KE6940 units, you do not need
to change these default network settings. See Default IP Addresses,
page 24, for further details.
2. In a network setup with multiple units, each KE6900T / KE6940T and
KE6900R / KE6940R must be configured with a unique IP address.
See Network Configuration, page 23, for further details.
3. We recommended using 1000Mbps Gigabit Ethernet switches
between KE69xx devices installed on different LAN segments. 10/
100Mbps switches might cause poor performance.
4. In multipoint configurations, the IGMP and flow control function of
your network switches/hubs must be enabled to avoid the
deterioration of data throughput. To ensure functionality use a layer 3
switch that supports IGMP queries.
5. If your network uses cascaded switches, please check to ensure the
data throughput is sufficient.
6. To get the best performance, we suggest creating a private network
for KE69xx devices, as they are bandwidth-intensive devices.
To configure the network settings, do the following:
1. Setup the hardware and connect the Transmitter and Receiver to the local
area network (See Setting Up a LAN Installation, page 19, for details).
2. From the Receiver, tap the Scroll Lock key twice to invoke the OSD.
3. Select the User Station or Transmitter from the Sidebar menu.
4. Enter the password and click Configure.
The default password is: password.
5. From the Network tab select Set IP address manually and enter the
following:
IP Address sets the IP address for the KE6900 / KE6940. Key in a
valid unique IP address.
23
Return
To exit the OSD, press [Esc] on the keyboard, click Logout; tap the Scroll
Lock key twice; or return to the OSD main page and press the front panel OSD
pushbutton (Receiver only).
At this point the User Station can connect to the Transmitter to access the
remote computer (see Connecting, page 38 for instructions).
Default IP Addresses
The preconfigured factory-default IP addresses for the KE6900 / KE6940 units
are as follows:
KE6900T / KE6940T 192.168.0.61
KE6900R / KE6940R 192.168.0.60
24
Chapter 3
OSD Operation
Overview
This chapter provides instructions to configure and operate the KE6900 /
KE6940 using the local On Screen Display (OSD). To configure the network
settings with the OSD, see Network Configuration, page 23.
LED Display
Both the Transmitter and Receiver have front panel LEDs to indicate their
operating and power status, as explained in the table below:
LED
LAN
Indication
Power
Local
Remote
25
Note: 1. For the Receiver to discover the Transmitter over a network, both
must be on the same subnet of the LAN.
2. You can change the OSD hotkeys. See User Preferences, page 37 for
details.
3. If the keyboard/mouse wont work when the OSD is invoked, see
USB Mode, page 62.
26
OSD Interface
After you invoke the OSD, the main page appears:
Note: A password is required to enter the OSD. The default password is:
password. For security purposes, we recommend you change this to
something unique.
The OSD components are described in the table, below:
No.
Item
Description
User Station
(Receiver)
Transmitter
User Preferences
About
Password
Configure
Back to Video
Clicking this button exits the OSD and returns you to the
computers video display.
27
Network
The Network tab allows you to configure the User Stations IP address settings:
Item
IP Installer
Description
The IP Installer is an external Windows-based utility for
assigning an IP address to the device. Click one of the radio
buttons to select Enable, View Only, or Disable for the IP
Installer utility. See IP Installer, page 137 for instructions.
Note: For security, we strongly recommend that you set this to
View Only or Disable after each use.
Network
Configuration
28
Properties
The Properties tab allows you to configure the User Stations extender
settings:
Item
Mode
Description
Select Extender mode for simple one-to-one (Transmitter to
User Station) setups that are managed with the Receivers OSD
menu.
Select Desktop/Matrix mode to manage devices and
connections from the Matrix Manager web GUI. This mode is for
advanced administration of Transmitter to User Station
connections. (See Target Connections, page 74)
Properties
29
Item
RS232 Settings
Description
Configure the serial device settings for the User Station. The
default settings are:
Baud Rate: 9600
Parity: None
Data Bits: 8 bits
Stop bits: 1 bit
Flow Control: None
Enable Media
Select which type of media the User Station can stream from
Transmitters: Video, Audio, USB, and RS232.
Manager
Address
Beeper
USB Mode
Select the type of USB device you will connect to the USB ports:
vUSB: Use this option to plug USB peripherals into the USB
ports. This option also allows a keyboard and mouse with
special functions to plug into the USB ports for console use. Use
this only if the special functions of the keyboard or mouse are
required but do not work when plugged into the console ports.
When the keyboard and mouse are plugged into the USB ports,
they will not work within the OSD menus. To work within the
OSD menus, the keyboard and mouse must be plugged into the
console ports.
VM (Virtual Media): Only select this option if you are plugging a
USB disk into the USB ports. This will give you the highest data
transfer speeds but will not allow other USB devices plugged
into the USB ports to work.
Secure: Check this box to encrypt USB drives plugged into the
USB ports.
30
System
The System tab allows you to configure the User Stations general settings:
Item
Description
Device
Information
Reboot
Check the box and click Reboot to reset the User Stations
settings back to the factory default. All custom settings will be
lost.
User Station
Password
Change
31
Transmitter Configuration
When you select the Transmitter radio button and click Configure to login, the
Network tab appears:
Network
The Network tab allows you to configure the Transmitters IP address settings:
Item
IP Installer
Description
The IP Installer is an external Windows-based utility for
assigning an IP address to the device. Click one of the radio
buttons to select Enable, View Only, or Disable for the IP
Installer utility. See IP Installer, page 137 for instructions.
Note: For security, we strongly recommend that you set this to
View Only or Disable after each use.
Network
Configuration
32
Properties
The Properties tab allows you to configure the Transmitters extender settings:
Item
Mode
Description
Select Extender mode for simple one-to-one (Transmitter to
User Station) setups that are managed with the Receivers OSD
menu.
Select Desktop/Matrix mode to manage devices and
connections from the Matrix Manager web GUI. This mode is for
advanced administration of Transmitter to User Station
connections. (See Target Connections, page 74)
33
Item
Properties
Description
Port OS: Use the drop-down menu to select the operating
system of the computer connected to the Transmitter.
OS Language: Use the drop-down menu to select the
operating system language of the computer connected to the
Transmitter.
Enable Multicast Video: Check this box to allow a broadcast of
the Transmitters video signal to be sent out to multiple User
Stations.
Enable Multicast Audio: Check this box to allow a broadcast
of the Transmitters audio signal to be sent out to multiple User
Stations.
EDID Mode Selection: EDID contains a display's basic
information and is used by the source device to utilize the best
resolution across different monitors. Select how you want the
source device to acquire the display's EDID:
RS232 Settings
Manager
Address
34
Item
Transmitter
Video Attributes
Description
To set the Transmitters video settings:
Video Type: Select the DVI video connector being used by the
display: Digital (DVI-D) or Digital (DVI-I).
Color Depth: Select the number of bits to use for the color
depth: 24, 16, or 8. This is the number of bits used to describe
the color of a single pixel. A bit depth determines the number of
colors that can be displayed at one time.
Bandwidth Limit: Select the maximum bandwidth that the
Transmitter can use to transmit video over the network. A lower
bandwidth setting transmits lower quality video; a higher
bandwidth setting sends higher quality video but this can affect
network speed.
Video Quality: Select the video quality to use. 5 is the highest
video quality, and 1 is the lowest video quality. Options are: 1~5.
Background Refresh: Sets how often the Transmitter
refreshes the background image on the connected display.
Options are to refresh every 256,128, 64, 32,16, or 0 frames.
Beeper
Occupy Timeout
Set a time threshold for devices whose Access Mode has been
set to Occupy (see Allowed Access Mode, page 100). If there is
no activity from the User Station occupying the port for the
amount of time set here, the User Station is timed out and the
port is released. The first User Station to send keyboard or
mouse input after the port has been released gets to occupy the
port. Input a value from 1 to 240 seconds.
35
System
The System tab allows you to configure the Transmitters general settings:
Item
Description
Device
Information
Reboot
Transmitter
Password
Change
36
User Preferences
When you select the User Preferences radio button and click Configure to
login, the configuration screen appears:
Item
User Password
Change
Description
This section allows you to change the OSD password:
1. Key in the old password in the Old password field.
2. Key in the new password in the New password field.
3. Key in the new password again in the Confirm password
field.
OSD Language
OSD Hotkey
Logout Timeout
If there is no user input for the amount of time set with this
function, the user is automatically logged out of the OSD. A
login is necessary before the OSD can be accessed again.
Screen Blanker
Set how many minutes the OSD waits when a session is idle
before turning off the display.
37
Connecting
If the User Station is set to Extender mode, the video screen of the remote
computer will appear automatically when you exit the OSD (tap the Scroll
Lock key twice). In Desktop/Matrix mode you will see the System Login
screen, which provides access to the Connection Page by entering a username
and password:
Note: 1. The administrator account can be used to log in for the first time.
Username: administrator | Password: password. For security
purposes, we recommend you change this to something unique (see
User Management, page 85).
2. If the User Station does not require a login, click Login to system (see
Login Required, page 62).
3. For information about Extender and Desktop/Matrix modes see
Mode, page 29.
After you login the Connection Page appears, as shown on the next page.
38
Connections Page
After you have successfully logged in the Connection Page appears:
Item
Description
Target Name
Description
39
No.
3
Item
Connect
Description
To connect the User Station to a Target, click the
access type:
Exclusive: The first User Station to access the
Target has exclusive control over the Target. No
other User Stations can view the Target. The
Timeout function does not apply to this setting.
Occupy: The first User Station to access the Target
has control over the Target. However, additional
User Stations may view the Target's video display. If
the User Station controlling the Target is inactive for
longer than the time set in the Timeout box, control
is transferred to the first User Station to move the
mouse or strike the keyboard.
Share: Can simultaneously share control over the
Target. Input from the User Stations is placed in a
queue and executed chronologically.
View Only: User Station connects with view only
access to the Targets video display.
40
Next Page
Previous Page
Manual EDID
Logout
Go to Configuration
Window
Profile Page
Click the Profile Page tab and the following screen appears:
Item
Description
Profile Name
Description
Connect
Next Page
Previous Page
Logout
Go to Configuration
Window
41
42
Chapter 4
Download
To download the Matrix Manager Lite software, do the following:
1. Visit our website and click Support Go to ATEN eService.
43
Note: The trial software includes full functions to setup and configure single
device installations. The trial version will not expire. If you would like to
purchase the advanced software, please contact your ATEN reseller.
5. Click the software version you would like to download, then click Save.
6. Unzip the Matrix_Manager_Lite.zip file and double click the *.exe file to
start the installation.
7. Follow the instructions on the next page to install the software.
44
45
If you agree with the License Agreement, select I accept the terms of
the license agreement, and click Next.
4. The Choose Install Folder screen appears:
Select where you would like to install the program, and click Next.
5. The Choose Shortcut Folder screen appears:
Select where to create shortcuts for the program by selecting the options
provided, and click Next.
46
Click Done.
Note: If you are installing the Matrix Manager on a second computer for
redundancy (see Redundancy, page 107) remove the USB License key and
plug it into the primary computer running the Matrix Manager software.
47
48
Chapter 5
Browser Operation
Overview
The Matrix Manager software can be accessed through most standard web
browsers. Once users log in and are authenticated, the browser GUI comes up.
This chapter explains the login procedure and web browser components.
Logging In
To log into the Matrix Manager, do the following:
1. Open the browser and specify the IP address of the computer installed with
the Matrix Manager software, in the browser's URL location bar.
Note: If the administrator has configured the HTTP or HTTPS port setting
as something other than the default, you must include http:// or
https:// before the IP address, and specify the port number along
with the IP address. For example:
https://192.168.1.20:8443
Where 8443 is the https port number, and a colon is inserted between
it and the IP address.
2. If a Security Alert box appears, accept the certificate it can be trusted
(See Trusted Certificates, page 138 for details). The Login page appears:
49
1
5
6
2
3
4
Web Components
The web components are described in the table, below:
No.
50
Item
Description
Tab Bar
Menu Bar
Sidebar
Logout
ATEN Logo
Welcome Message
Interactive Display Panel This is your main work area. The screens that
appear reflect your menu choices and Sidebar item
selection.
A plus (+) sign in front of an item means that there are additional items
nested inside of it. Click the plus sign to expand the view and show the
nested items.
The plus sign changes to a minus sign (-)when an item is expanded. Click
the minus sign to collapse the view and hide the nested items.
For devices, if the device is on line, its icon is in GREEN; if it is off line,
its icon is ORANGE.
51
Function
Dashboard: The Dashboard is used to view information about
current connections, sessions, and device events. The first page
provides an overview and the sidebar provides a link to view details
about each section. The Dashboard is discussed on page 53.
Device Management: The Device Management page is used to
configure and control the overall operation of the devices added to
the Matrix Manager. Device Management is discussed on page 57.
User Management: The User Management page is used to create
and manage Users and Groups. It is also used to assign
permissions to them. User Management is discussed on page 115.
System: The System page is used to configure the Matrix
Managers global settings and setup ANMS authorization and
authentication. The System page is discussed on page 98.
Logs: The Log page displays the contents of the log file. The Log
page is discussed on page 111.
52
Chapter 6
Dashboard
Overview
The Dashboard tab is used to view events about connections, sessions, and
online devices. The Home page provides an overview of the information
provided in each section. The Sidebar menu provides a link to each section for
a more detailed view of each item.
The Dashboard opens on the Home page, as shown here:
At the bottom of the page, click Shutdown* to stop the KeManager service; or
Restart to stop/restart the service. Both options will logout all user web
sessions.
Note: Clicking Shutdown stops the KeManager service, and web sessions
will not be available until the KeManager service is restarted.
53
Active Connections
The Active Connections page lets an administrator see the active Target
connections (User Stations connected to Transmitters) and provides
information about each of their sessions.
The meanings of the headings at the top of the page are straightforward.
Start Time refers to the date/time the connection between the User Station
and Transmitter began.
Username refers to the user that logged into the User Station to establish
the connection.
User Station refers to the Receiver that is being used to access the Target
connection.
Access Mode refers to the type of access (Exclusive, Occupy, Share, View
only) that the User Station is connecting with.
Active Sessions
The Active Sessions page lets the administrator see all of the users logged into
the Matrix Manager and provides information concerning the who, where and
when of each session.
This page also gives the administrator the option of forcing a user logout by
selecting the user and clicking Kill Session from the bottom of the page.
54
Chapter 6. Dashboard
The meanings of the headings at the top of the page are straightforward.
ID refers to the identification number assigned by the system.
Name refers to the name entered on the User Stationss System page.
Model Name refers to the Receiver model number.
Status refers to the User Stations online status.
Address refers to the IP address of the User Station.
Streams refers to the source type that the User Station is configured to
Online Transmitters
The Online Transmitters page lets the administrator see all of the Transmitters
that are currently available on the network and provides information about each
device.
The meanings of the headings at the top of the page are straightforward.
ID refers to the identification number assigned by the system.
Name refers to the name entered on the Transmitters System page.
Model Name refers to the Transmitter model number.
Status refers to the Transmitters online status.
Address refers to the IP address of the Transmitter.
Streams refers to the source type that the Transmitter is configured to
55
Latest Events
The Latest Events page lets the administrator see the most recent Dashboard
events that relate to the current connections and sessions, and provides details
about each.
The meanings of the headings at the top of the page are straightforward.
Time refers to the date and time that the event occurred.
User refers to the username that the event relates to. If no username
appears, the event is general system information.
Device refers to the Transmitter or User Station that relates to the event. If
no device is listed the event refers to the Matrix Manager.
56
Chapter 7
Device Management
Overview
The Device Management tab contains four menu bar items: User Stations,
Transmitters, Targets, and Profiles. Each page provides a way to add,
configure, and managed Transmitters, Receivers, and connections. Before
Transmitters and Receivers can be added they must be connected to the
network with an IP address.
The Device Management tab opens on the User Stations page, as shown here:
57
User Stations
The User Stations page allows you to add, configure, and delete Receivers. The
Sidebar provides three menu options: User Stations, Unmanaged User
Stations, and Rx Video Group. User Stations are Receivers that have been
added to the Matrix Manager. Unmanaged User Stations are Receivers on the
network that havent been added to the Matrix Manager. For the Matrix
Manager to discover a Receiver, it must be connected to the local network with
an IP address. Rx Video Group lists Transmitters that have been grouped to
share the video from one computer to multiple User Stations.
Click User Stations from the menu bar and the following screen appears:
The main page provides an overview of each User Station. The Sidebar
provides a link with a more detailed view of each.
The meanings of the headings at the top of the page are straightforward.
ID refers to the identification number assigned by the system.
Name refers to the name entered on the User Stationss System page.
Model Name refers to the Receiver model number.
Access Mode refers to the User Stations mode set in the Properties.
Status refers to the User Stations online status.
Address refers to the IP address of the User Station.
Streams refers to the source type that the User Station is configured to
stream: Video, Audio, USB, and Serial.
58
59
2. The Network tab appears with the User Stations IP address settings:
Item
IP Installer
Description
The IP Installer is an external Windows-based utility for
assigning IP addresses to the device. Click one of the radio
buttons to select Enable, View Only, or Disable for the IP
Installer utility. See IP Installer, page 137 for details.
For security, we strongly recommend that you set this to View
Only or Disable after each use.
60
Item
Network
Configuration
Description
For dynamic IP address assignment, select the Obtain IP
address automatically radio button.
To specify a fixed IP Address, Subnet Mask, and Default
Gateway select the Set IP address manually radio button and
fill in the fields with values appropriate for your network.
For information to configure the network settings locally on the
device see Network Configuration, page 23.
Item
Mode
Description
Select Extender mode for simple one-to-one (Transmitter to
User Station) setups that are managed with the Receivers OSD
menu.
Select Desktop/Matrix mode to manage devices and
connections from the Matrix Manager. This mode is for
advanced administration of Transmitter to User Station
connections. (See Target Connections, page 74)
Properties
61
Item
Description
RS-232 Settings
Configure the settings for the serial device the User Station will
be connecting to. The default settings are:
Baud Rate: 9600
Parity: None
Data Bits: 8 bits
Stop bits: 1 bit
Flow Control: None
Enable Media
Select which source type the User Station can stream : Video,
Audio, USB, and RS232.
Manager
Address
Login Required
Beeper
USB Mode
Select the type of USB device you will connect to the USB ports:
vUSB: Use this option to plug USB peripherals into the USB
ports. This option also allows a keyboard and mouse with
special functions to plug into the USB ports for console use. Use
this only if the special functions of the keyboard or mouse are
required but do not work when plugged into the console ports.
When the keyboard and mouse are plugged into the USB ports,
they will not work within the OSD menus. To work within the
OSD menus, the keyboard and mouse must be plugged into the
console ports.
VM (Virtual Media): Select this option only if you are plugging a
USB disk drive (including USB HDD/optical disk) into the USB
ports. This will give you the highest data transfer speeds but will
not allow other USB devices to work when plugged into the USB
ports.
Secure: Check this box to encrypt USB disk drives plugged into
the USB ports.
62
Item
Description
General
Reboot
Check the box and click Reboot to reset the User Stations
settings back to the factory default. All custom settings will be
lost.
User Station
Password
Change
63
Rx Video Group
Creating an Rx Video Group allows you to cascade up to four Transmitters
connected to separate video cards on one computer and share the video with
four User Stations while giving the first User Station keyboard and mouse
access. The image below provides an example of the setup without the actual
physical connections or possible device connections.
Transmitters
Receivers
A
A
A
A
Hardware Setup
1. Connect each Transmitter to the network and to a DVI port on the computer.
64
65
4. Use the Video 1 drop-down menu to select the Receiver that will have
keyboard and mouse access to the computer.
Note: All Receivers can switch KVM access to other Transmitters but only
Video 1 has keyboard and mouse access to the computer for the group.
5. Use the Video 2, Video 3 and Video 4 drop-down menus to select the
other Receivers for the group.
6. Click Save. The group appears in the Sidebar.
7. On the menu bar, go to Targets.
8. Add a new Target.
9. Set the Source Stream to map the Transmitters to the Rx Video Group
Receivers, as such: KVM Transmitter Video 1; Video 2 Video 2;
Video 3 Video 3; Video 4 Video 4.
Use the KVM Transmitter drop-down menu to select the Transmitter
connected to the computers keyboard and mouse ports.
Use the Video 2, Video 3 and Video 4 drop-down menus to select the
other Transmitters connected to the computer.
Use the Audio, USB and Serial drop-down menus to select the
Transmitter for each source signal. The Transmitter selected sends the
signal to the Receiver set with the same Video #.
10. Configure the remaining Target settings (see Adding a Target, page 76).
11. Click Save.
66
Transmitters
The Transmitters page allows you to add, configure, and delete Transmitters.
The Sidebar provides two options: Transmitters and Unmanaged
Transmitters. Unmanaged Transmitters are Transmitters on the network that
havent been added to the Matrix Manager. For the Matrix Manager to discover
a Transmitter, it must be connected to the local network with an IP address.
Click Transmitters from the menu bar and the following screen appears:
67
Adding a Transmitter
To add a Transmitter, do the following:
1. From Unmanaged Transmitters, select a Transmitter and click Add in:
68
Configuring a Transmitter
A Transmitters settings can be modified from the Transmitters main page.
Changes that are saved are updated on the Transmitter device across the
network. To configure a Transmitter:
1. Select a Transmitter and click Modify.
Item
IP Installer
Description
The IP Installer is an external Windows-based utility for
assigning IP addresses to the device. Click one of the radio
buttons to select Enable, View Only, or Disable for the IP
Installer utility. (See IP Installer, page 137)
For security, we strongly recommend that you set this to View
Only or Disable after each use.
69
Item
Network
Configuration
Description
For dynamic IP address assignment, select the Obtain IP
address automatically radio button.
To specify a fixed IP Address, Subnet Mask, and Default
Gateway, select the Set IP address manually radio button and
fill in the fields with values appropriate for your network.
For information to configure the network settings locally on the
device see Network Configuration, page 23.
Item
Mode
Description
Select Extender mode for simple one-to-one (Transmitter to
User Station) setups that are managed with the Receivers OSD
menu.
Select Desktop/Matrix mode to manage devices and
connections from the Matrix Manager. This mode is for
advanced administration of Transmitter to User Station
connections. (See Target Connections, page 74)
70
Item
Properties
Description
Port OS: Use the drop-down menu to select the operating
system of the computer connected to the Transmitter.
OS Language: Use the drop-down menu to select the
operating system language of the computer connected to the
Transmitter.
Enable Multicast Video: Check this box to allow a broadcast of
the Transmitters video signal to be sent to multiple User
Stations.
Enable Multicast Audio: Check this box to allow a broadcast
of the Transmitters audio signal to be sent to multiple User
Stations.
EDID Mode Selection: EDID contains a display's basic
information and is used by the source device to utilize the best
resolution across different monitors. Select how you want the
source device to acquire the display's EDID:
RS-232 Settings
Manager
Address
71
Item
Transmitter
Video Attributes
Description
These refer to the Transmitters video settings:
Video Type: Select the DVI video connector being used by the
display: Digital (DVI-D) or Digital (DVI-I).
Color Depth: Select the number of bits to use for the color
depth: 24, 16, or 8. This is the number of bits used to describe
the color of a single pixel. A bit depth determines the number of
colors that can be displayed at one time.
Bandwidth Limit: Select the maximum bandwidth that the
Transmitter can use to transmit video over the network. A lower
bandwidth transmits lower quality video; a higher bandwidth
sends higher quality video but this can affect network speed.
Video Quality: Select the video quality to use. 5 is the highest
video quality, and 1 is the lowest video quality. Options are: 1~5.
Background Refresh: Sets how often the Transmitter
refreshes the background image on the connected display.
Options are to refresh every 256,128, 64, 32,16, or 0 frames.
Beeper
Occupy Timeout
Set a time threshold for User Stations whose Access Mode has
been set to Occupy If there is no activity from the User Station
occupying the port for the amount of time set here, the User
Station is timed out and the port is released. The first User
Station to send keyboard or mouse input after the port has been
released gets to occupy the port. Input a value from 1 to 240
seconds.
72
Item
Description
General
Reboot
Transmitter
Password
Change
Deleting a Transmitter
To delete a Transmitter:
1. Select the Transmitter you want to delete.
2. Click Move Out.
The device list updates with the remaining Transmitters. The Transmitter you
deleted will appear on the Unmanaged User Stations main page and Sidebar
menu.
73
Target Connections
With Target connections a User Station can connect to multiple Transmitters,
individually or simultaneously and stream the Video, Audio, USB, and Serial
source from different Transmitters. For example: you can create a Target that
connects to four Transmitters to access a different source on each computer, as
shown below:
Transmitters
Video TX
Audio TX
KVM TX
Serial TX
Target
Setting
User Station
Receiver
Create Targets to allow User Stations to connect to any Transmitters you have
setup- individually or simultaneously. The Target defines the connection to the
sources. At the User Stations you can select the Target connections you create.
To setup Targets: first create a Target that defines the connection, then create
a Profile to give the User Station(s) access to the Target. Instructions are
provided on the pages that follow.
74
Targets
A Target defines the Transmitter connections for a User Station. This allows a
User Station to connect to different Transmitters and stream sources from
different Transmitters, depending on how the Target is defined. Once Targets
are created you can select them from the User Stations Connection Page (see
Connecting, page 38).
Click Targets from the menu bar and the following screen appears:
The main page provides an overview of each Target. The Sidebar provides a
link with a more detailed view of each.
The meanings of the headings at the top of the page are straightforward.
ID refers to the identification number assigned by the system.
Name refers to the name entered on the Targets Info page.
Bound states whether the Targets connections are all bound to the same
Transmitter.
Streams refers to the source type that the Target is configured to stream:
Video, Audio, USB, or Serial.
Video TX, Audio TX, USB TX, RS232 TX lists the Transmitters name for
each source stream.
Click Modify to change the selected Targets settings.
Click Add to create a new Target.
Click Delete to remove the selected Target.
75
Adding a Target
To add a Target, do the following:
1. From the Targets main page, click Add:
Item
76
Description
General
Source Stream
Item
Allowed Access
Mode
Description
Check the box for the type of access mode you want to allow on
this Target. This defines how the Target can be accessed when
multiple users access it.
View Only: Users only have view access to the Targets video
display.
Share: Users simultaneously share control over the Target.
Input from the users is placed in a queue and executed
chronologically.
Occupy: The first user to access the Target has control over the
Target. However, additional users may view the Target's video
display. If the user who controls the Target is inactive for longer
than the time set in the Timeout box (see Occupy Timeout,
page 72), Target control is transferred to the first user to move
the mouse or strike the keyboard.
Exclusive: The first user to access the Target has exclusive
control over the Target. No other users can view the Target. The
Timeout function does not apply to Targets which have this
setting.
Select a Target Group from the Selected column and use the left arrow
to add the Target to the group. Select a Target Group from the
Available column and use the right arrow to remove the Target from
the group. See Target Groups, page 79 for details.
77
Item
Users/Groups
Description
You can assign individual access rights to Users and Groups for
the Target by checking the appropriate boxes:
View Only: Only has view access to the Targets video display.
Share: Can simultaneously share control over the Target. Input
from the users is placed in a queue and executed
chronologically.
Occupy: The first user to access the Target has control over the
Target. However, additional users may view the Target's video
display. If the user who controls the Target is inactive for longer
than the time set in the Timeout box (see Occupy Timeout,
page 72), Target control is transferred to the first user to move
the mouse or strike the keyboard.
Exclusive: The first user to access the Target has exclusive
control over the Target. No other users can view the Target. The
Timeout function does not apply to Targets which have this
setting.
78
Target Groups
Target Groups allow administrators to easily and efficiently manage users and
Targets. Since Target Group access rights apply to any Target that is a member
of the group, administrators need only set them once for the group, instead of
having to set them for each Target individually. Multiple groups can be defined
to allow some users access to specific Targets, while restricting other users
from accessing them.
Item
General
Description
Enter a Name and Description for the Target Group.
79
Select a Target from the Selected column and use the left arrow to add
it to the group. Select a Target from the Available column and use the
right arrow to remove it from the group.
4. Click the Permissions tab to set the group access rights:
Item
Users/Groups
Description
You can assign the access rights to Users and Groups for the
Target Group by checking the appropriate boxes:
View Only: Has view access to the Target video display.
Share: Simultaneously share control of the Target. Input from
the users is placed in a queue and executed chronologically.
Occupy: The first user to access the Target has control over the
Target. However, additional users may view the Target's video
display. If the user who controls the Target is inactive for longer
than the time set in the Timeout box (see Occupy Timeout,
page 72), Target control is transferred to the first user to move
the mouse or strike the keyboard.
Exclusive: The first user to access the Target has exclusive
control. No other users can view the Target. The Timeout
function does not apply to Targets which have this setting.
Profiles
Profiles are created for Targets to allow individual User Station access to the
connection. Create a Profile for the Target and assign access for each User
Station.
Click Profiles from the menu bar and the following screen appears:
The main page provides an overview of each Profile. The Sidebar provides a
link with a more detailed view of each Profile.
The meanings of the headings on the Profile List are straightforward.
ID refers to the identification number assigned by the system.
Name refers to the name entered on the Profiles Settings page.
Type refers to the connection type.
Description refers to the description entered on the Profiles Settings page.
Operation allows you to click Connect to send a Profiles settings to the
Transmitters and User Stations.
Click Modify to change the selected Profiles settings.
Click Add to create a new Profile.
Click Delete to remove the selected Profile.
81
Adding a Profile
To add a Profile, do the following:
1. From the Profile main page, click Add:
2. The Profile Settings tab appears with the Profile and access settings:
Item
Name/
Description
82
Description
Enter a Name and Description for the Target.
Item
Access Mode
Description
This defines how the Target in the Profile can be accessed by
User Stations when multiple users access it.
View Only: Users only have view access to the Targets video
display.
Share: Users simultaneously share control over the Target.
Input from the users is placed in a queue and executed
chronologically.
Occupy: The first user to access the Target has control over the
Target. However, additional users may view the Target's video
display. If the user who controls the Target is inactive for longer
than the time set in the Timeout box (see Occupy Timeout,
page 72), Target control is transferred to the first user to move
the mouse or strike the keyboard.
Exclusive: The first user to access the Target has exclusive
control over the Target. No other users can view the Target. The
Timeout function does not apply to Targets which have this
setting.
Target
This table lists all the Targets and User Stations available.
Checking a box enables the User Station to use the Target
connection, listed to the left. The Target will appear on the User
Stations Connection Page (See Connections Page, page 39),
allowing you to connect to it.
Connect
83
84
Chapter 8
User Management
Overview
User Management has two menu bar items used to create Accounts and
Groups. The User Management tab opens on the Accounts page, as shown
here:
The page is organized into two main areas: the Sidebar at the left, and the large
main panel at the right.
Users and groups appear in the panel at the left of the page. The large
panel at the right provides more detailed information at-a-glance for each.
There are menu bar entries for Accounts (Users) and Groups.
Depending on the menu item selected, either Users or Groups are listed
in the Sidebar.
The sort order of the information displayed can be changed by clicking the
main panel column headings.
The buttons below the main panel are used to manage users and groups, as
shown in the sections that follow.
85
Users
The Matrix Manager supports two types of user accounts, shown in the table
bellow:
User Type
Role
Administrator
User
Adding Users
To add a user, do the following:
1. Select Users in the Sidebar.
2. Click Add at the bottom of the main page. The User tab opens:
Description
Username
Local User
86
Field
Description
Password
Confirm Password
Description
Role
3. At this point you can assign the new user to a group by selecting the
Groups tab the Groups page is discussed on page 91. You can also assign
the users Targets and Groups access rights by selecting the Devices tab
the Devices page is discussed on page 95.
Note: Optionally, you can skip this step now to add more users and create
groups, and come back to it later.
4. When your selections have been made click Save.
5. When the Operation Succeeded message appears, click OK.
6. Click Users in the Sidebar to return to the main screen. The new user
appears in the Sidebar list and in the main panel, as well.
The Sidebar Users list can expand and collapse. If the list is expanded,
click the minus symbol ( ) next to the Users icon to collapse it; if it is
collapsed there is a plus symbol ( + ) next to the icon. Click the plus
symbol to expand it.
The icon for administrators is orange; the icon for users is green.
The large main panel shows the users name; the description that was
given when the account was created; and whether the account is
currently active or has been disabled.
87
88
Groups
Groups allow administrators to easily and efficiently manage users and
devices. Since device access rights apply to anyone who is a member of the
group, administrators need only set them once for the group, instead of having
to set them for each user individually. Multiple groups can be defined to allow
some users access to specific devices, while restricting other users from
accessing them.
Creating Groups
To create a group, do the following:
1. Select Groups on the menu bar.
2. Click Add at the bottom of the main panel. The Group notebook opens,
with the Group tab selected:
Description
Group Name
Description
4. At this point you can assign users to the group by selecting the Members
tab the Members page is discussed on page 93. You can also assign the
groups Targets and Target Groups access rights by selecting the Devices
tab the Devices page is discussed on page 95.
5. When your selections have been made click Save.
6. When the Operation Succeeded message appears, click OK.
7. Click Group in the Sidebar to return to the main screen. The new group
appears in the Sidebar Group list and in the main panel.
89
The Sidebar Group list can expand and collapse. If the list is expanded,
click the minus symbol ( ) next to the Users icon to collapse it; if it is
collapsed there is a plus symbol ( + ) next to the icon. Click the plus
symbol to expand it.
The large main panel shows the groups name, and the description that
was given when the group was created
Repeat the above procedure to add additional groups.
Note: You must perform Step 7 before attempting to add a new group, or else
the new group you are creating will replace the group you just finished
creating.
Modifying Groups
To modify a group, do the following:
1. In the Sidebar Group list, click the groups name
or
In the main panel, select the groups name.
2. Click Modify.
3. In the Group notebook that comes up, make your changes, then click Save.
Note: The Group page is discussed on page 89; the Members page is
discussed on page 93, The Devices page is discussed on page 95.
Deleting Groups
To delete a group do the following:
1. In the Sidebar, click the Groups icon.
2. In the main panel, select the groups name.
3. Click Delete.
4. Click OK.
90
4. In the Available column, select the group that you want the user to be in.
5. Click the Right Arrow to put the groups name into the Selected column.
6. Repeat the above for any other groups that you want the user to be in.
7. Click Save when you are done.
Note: If a user has permissions in addition to the ones assigned to the group,
the user keeps those permissions in addition to the group ones.
91
4. In the Selected column, select the group that you want to remove the user
from.
5. Click the Left Arrow to remove the groups name from the Selected
column. (It goes back into the Available column.)
6. Repeat the above for any other groups that you want to remove the user
from.
7. Click Save when you are done.
92
4. In the Available column, select the user that you want to be a member of
the group.
5. Click the Right Arrow to put the users name into the Selected column.
6. Repeat the above for any other users that you want to be members of the
group.
7. Click Save when you are done.
Note: If a user has permissions in addition to the ones assigned to the group,
the user keeps those permissions in addition to the group ones.
93
4. In the Selected column, select the user that you want to remove from the
group.
5. Click the Left Arrow to remove the users name from the Selected
column. (It goes back into the Available column.)
6. Repeat the above for any other users that you want to remove from the
group.
7. Click Save when you are done.
94
Device
You can assign Target and Target Group permissions from the Devices tab. For
information on Targets and Target Groups See Targets, page 75.
Description
Targets
Lists the Targets which you can assign access rights to for
the user. (See Targets, page 75 for details)
Groups
Lists the Target Groups which you can assign access rights
to for the user. (See Target Groups, page 79 for details)
95
Field
Columns
Description
Check the boxes to apply access rights on the device for the
user. This defines how the Target can be accessed when
multiple users access it.
View Only: Users can only view the remote screen, and
cannot perform operations on it.
Share: Users simultaneously share control over the Target.
Input from the users is placed in a queue and executed
chronologically.
Occupy: The first user to access the Target has control over
the Target. However, additional users may view the Target's
video display. If the user who controls the Target is inactive
for longer than the time set in the Timeout box, Target control
is transferred to the first user to move the mouse or strike the
keyboard.
Exclusive: The first user to access the Target has exclusive
control over the Target. No other users can view the Target.
The Timeout function does not apply to Targets which have
this setting.
96
97
Chapter 9
System
Overview
The System tab is used to configure the Matrix Managers system settings and
provides three menu bar items: Global Settings, ANMS and Redundancy.
The System tab opens on the Global Settings page, as shown here:
98
Chapter 9. System
Global Settings
The Global Settings page lets an administrator change the default settings used
for the Matrix Manager:
Item
Description
General
Network Ports
99
Item
Allowed Access Mode
Description
Select the default Access Mode for devices added to the
Matrix Manager. This defines how the device can be
accessed when multiple users logon.
View Only: Users can access the computer and view the
screen, but cannot perform any operations on it.
This will be the User Stations default setting when they are
added to the Matrix Manager. You can change this setting
from the User Stations Properties.
Check Login Required to prompt users for a username
and password at the User Station OSD before being able
to access the Connections Page (see Connections
Page, page 39). If you uncheck this, you must set the
Anonymous User.
100
Chapter 9. System
Item
Description
Global Device Properties These settings allow you to set the default properties used
by all devices:
Occupy Timeout: Set the number of seconds for a
user's session to be inactive before the access is
released for use by another user, when using the
Occupy Access Mode. This will be the default setting for
Transmitters.
Beeper: Check this box for the device to alert you with a
sound when its first being accessed or when a configuration change is made.
Use the Sync check box for each option above to push the
setting change to the devices after you click Save.
101
ANMS
The ANMS (Advanced Network Management Settings) page is used to set up
login authentication and authorization management from external sources. It is
organized as a notebook with two tabs each with a series of related panels, as
described below.
Event Destination
SMTP Settings
To have the Matrix Manager email reports from the SMTP server to you,
do the following:
1. Enable the Enable report from the following SMTP Server, select the
the Log Level (Information, Warning, or Error), and key in the SMTP
Server IP address and SMTP Port.
2. If your server requires authentication, check the Server requires
authentication checkbox, and key in the appropriate information for the
Account Name and Password fields.
3. Key in the email address of where the report is being sent from in the
From field.
102
Chapter 9. System
Note:
4. Key in the email address (addresses) of where you want the SMTP
reports sent to in the To field.
Note: If you are sending the report to more than one email address,
separate the addresses with a semicolon. The total cannot exceed
256 Bytes.
5. Click Save.
Syslog Settings
To record all the events that take place on the Matrix Manager and write
them to a Syslog server, do the following:
1. Check Enable.
2. Use the drop-down menu to select the Log Level (Information,
Warning, or Error).
3. Key in the Server IP address of the Syslog server.
4. Key in the Service Port number. The valid port range is 1-65535.
5. Click Save.
103
RADIUS Settings
To allow authentication and authorization for the KE6900 / KE6940
through a RADIUS server, do the following:
1. Check Enable.
2. Fill in the IP addresses and service port of the Preferred RADIUS
Server and Alternate RADIUS Server.
3. In the Timeout field, set the time in seconds that the Matrix Manager
waits for a RADIUS server reply before it times out.
4. In the Retries field, set the number of allowed retries.
5. In the Shared Secret field, key in the character string that you want to
use for authentication between the Matrix Manager and the RADIUS
Server. A minimum of 6 characters is required.
6. On the RADIUS server, Users can be authenticated with any of the
following methods:
Set the entry for the user as su/xxxx
Where xxxx represents the Username given to the user when the
account was created on the Matrix Manager.
Use the same Username on both the RADIUS server and the
Matrix Manager.
Use the same Group name on both the RADIUS server and the
Matrix Manager.
104
Chapter 9. System
Action
Enable
Enable SSL
LDAP Server IP
and Port
Fill in the IP address and port number for the LDAP / AD server.
You can use the IPv4 address, the IPv6 address or the domain
name in the LDAP Server field.
Set the time in seconds that the Matrix Manager waits for an
LDAP / AD server reply before it times out.
Admin DN
Admin Name
Password
Search DN
105
Note: If this method is used, the LDAP schema for MS Active Directory
must be extended. Without schema Only the Usernames used on
the Matrix Manager are matched to the names on the LDAP / AD
server. User privileges are the same as the ones configured on the
Serial Console Server.
Without schema Only the Usernames used on the Matrix Manager
are matched to the names on the LDAP server. User privileges are the
same as the ones configured on the switch.
Without schema Only Groups in AD are matched. User privileges are
the ones configured for the groups he belongs to on the switch.
Without schema Usernames and Groups in AD are matched. User
privileges are the ones configured for the User and the Groups on the
switch.
TACACS+ Settings:
106
Chapter 9. System
Redundancy
The Redundancy page sets up a second computer as backup in case the
computer hosting the Matrix Manager goes off-line. If the Matrix Manager is
off-line, the secondary computer will automatically take over operations,
allowing all connections to continue without disruption with only a brief
period (30 seconds) when new connections can't be started. When the primary
computer comes back online it retrieves the database with any changes from
the secondary computer and re-takes all Matrix Manager operations.
To setup Redundancy, do the following:
1. Install the Matrix Manager on a second computer with the USB License
key (see page 43).
2. Open the Matrix Manager and go to the System Redundancy page.
4. Check the Enable Redundancy box and select the Slave radio button.
107
8. Remove the USB License key and plug it into the primary computer
running the Matrix Manager software.
9. Open the Matrix Manager on the primary computer and go to the System
Redundancy page.
108
Chapter 9. System
11. Check the Enable Redundancy box and select the Master radio button.
12. Use the Slave drop-down menu to select the secondary computers IP
address.
13. Enter the Username and Password of the secondary computers local
administrator account.
14. Check the Auto Switch box to automatically switch the Matrix Manager
to the secondary computer when the primary computer is offline and
reverse the action when the primary computer is back online.
15. Click OK.
16. The Redundancy page provides information about the configuration.
Item
Action
Mode
Status
Peer IP Address
109
Item
Action
Peer ID
Auto Switch
Event Log
110
Chapter 10
Logs
Overview
The Matrix Manager logs all the events that take place on it an stores them in
a Log. The Logs tab opens on the System Log page, as shown here:
111
System Log
The System Log page displays events that take place on the Matrix Manager
and provides a breakdown of the time, user, severity, device, and log
information, for a description of each event. You can change the sort order of
the display by clicking on the column headings.
The first four buttons on the lower row navigate through the pages of the
listed events. The left takes you to the first page; the right takes you to the
last page; the middle buttons move you backward or forward one page.
Note: These buttons are only active when there is a relevant action they can
perform. For example, when there is more than one page of information and
you are on the first page, the move forward and last page buttons are
active, but the move backward and first page buttons are not.
Clicking the plus sign (+) beside a category in the sidebar menu expands
the event headings into subcategories. Selecting a subcategory allows you
to view only the logs that relate to that choice.
Clicking All from the sidebar returns you to the
default view to display all events.
In general, a blank page, indicates that there were no
log events recorded for that category.
112
The log file tracks a maximum of 512 events. When the limit is reached, the
oldest events get discarded as new events come in. The buttons at the bottom
of the page are shown below and described in the table:
Button
Explanation
Navigation Buttons
Drop-Down Menu
Export
Filter
Filter
Filter lets you narrow the log event display to ones that occurred at specific
times; ones containing specific words or strings. When you access this
function, the log filter dialog box appears at the bottom of the page:
Description
This feature lets you filter for events that occurred at specific
times, as follows:
Today: Only the events for the current day are displayed.
All: Displays all events.
Range: Select a time frame of events. After selecting Range, click
inside the From/To text box in order to bring up the calendar.
From: Filters for events from a specific date and time to the
present. Put a check in the checkbox to bring up a calendar. Set
the date and time that you want the filtering to start from. All
events from the Start date/time to the present are displayed.
To: Filters for events from a specific date and time to a specific
date and time. First select the From (described above).
After checking Range, you have to click inside the text box in
order to bring up the calendar.
Pattern
Filters for a particular word or string. Key the word or string into
the Information text box. Only events containing that word or
string are displayed. Wildcards (? for single characters; * for
multiple characters) and the keyword or are supported. E.g., h*ds
would return hands and hoods; h?nd would return hand and hind,
but not hard; h*ds or h*ks would return hands and hooks.
Apply
Reset
Click this button to clear the entries in the dialog box and start with
a clean slate.
Cancel
114
Chapter 11
Maintenance
Overview
The Maintenance tab has four menu bar options: Backup/Restore, Firmware
Upgrade, Certificates, and Preferences. When you click the Maintenance
tab, it opens on the Backup/Restore page, as shown here:
115
Backup / Restore
When you click the Maintenance tab Matrix Manager, the Backup/Restore
page is displayed. The page is divided into two main sections: Backup, and
Restore:
Operation
Backup
Restore
Backup
To back up system configuration settings, do the following:
1. (Optional) In the Backup panel, provide a password for the backup file.
Any combination of characters may be used for the password.
Note: Providing a password is a security feature if you provide a
password, you will need to give the same password in order to
restore the configuration settings from this file.
2. Click Backup.
116
3. In the dialog box that comes up, Click Save to save the configuration file
(System.conf) to a location on your hard disk.
4. Navigate to the directory where you want to save the file and click Save.
Restore
To restore system configuration settings, do the following:
1. In the Restore panel, click Browse.
2. Navigate to the directory where the backup file is located and select it.
3. When you return to the Backup/Restore page enter the password you set
when the backup file was created.
Note: If you did not set a password for the file, leave the field blank.
4. Click Restore.
5. Click OK to confirm that you want to restore the configuration data.
When the Restore procedure is in process, a message stating that the
Matrix Manager will restart will appear. After a short while the Matrix
Manager closes and refreshes at the log in screen. When it comes back up
the configuration settings that were restored from the backup file are in
effect.
117
Firmware Upgrade
New firmware versions can be downloaded from our website as they become
available. Check the website regularly, to find the latest upgrade packages.
Under Firmware Upgrade all KE6900/KE6940 devices that are discovered
online are provided in a list allowing you to select which devices get upgraded.
To upgrade the firmware do the following:
1. Go to our website and download the firmware upgrade package
appropriate to your KE6900 / KE6940 device.
2. Open your browser and log in to the Matrix Manager with an
administrators account.
3. Click the Maintenance tab; select Firmware Upgrade on the menu bar.
A confirmation dialog box may appear:
4. Click Yes to continue. After a short while, the Firmware Upgrade page
comes up:
All the KE6900 / KE6940 devices that are capable of being upgraded are
listed.
Note: Only online KE6900 / KE6940 devices show up in the list. Offline
devices do not get upgraded.
118
5. Make sure there is a check in the checkbox in front of the modules you
want to upgrade. Uncheck the modules that you do not want to upgrade.
6. Click Browse. Navigate to the directory where the firmware upgrade file
is located and select it.
7. Enable or disable Check Firmware Version
If you enabled Check Firmware Version the current firmware level is
compared with that of the upgrade file. If the current version is equal to
or higher than the upgrade version, a popup message appears, to inform
you of the situation and stops the upgrade procedure.
If you didn't enable Check Main Firmware Version, the upgrade file is
installed without checking what its level is.
8. Click Upgrade to start the upgrade procedure. As the upgrade proceeds,
progress information is shown on the screen. Once the upgrade completes
successfully, the devices will reset.
9. Log in to the and check the firmware version to be sure it is the new one.
119
Certificates
This page provides information about the Private Certificates:
Private Certificate
When logging in over a secure (SSL) connection, a signed certificate is used to
verify that the user is logging in to the intended site. For enhanced security, the
Private Certificate section allows you to use your own private encryption key
and signed certificate, rather than the default ATEN certificate.
There are two methods for establishing your private certificate: generating a
self-signed certificate; and importing a third-party certificate authority (CA)
signed certificate.
Generating a Self-Signed Certificate
If you wish to create your own self-signed certificate, a free utility
openssl.exe is available for download over the web. See Self-Signed
Private Certificates, page 139 for details about using OpenSSL to generate
your own private key and SSL certificate.
Obtaining a CA Signed SSL Server Certificate
For the greatest security, we recommend using a third party certificate
authority (CA) signed certificate. To obtain a third party signed certificate,
go to a CA (Certificate Authority) website to apply for an SSL certificate.
120
After the CA sends you the certificate and private encryption key, save
them to a convenient location on your computer.
Importing the Private Certificate
To import the private certificate, do the following:
1. Click Import from the bottom of the Private Certificate page, shown here:
2. Fill in the form with entries that are valid for your site according to the
example information in the following table:
Information
Country (2 letter code)
Example
TW
121
Information
Example
State or Province
Taiwan
Locality
Taipei
Organization
Organization Unit
Tech Department
Common Name
mycompany.com
Note: This must be the exact domain name of the site
that you want the certificate to be valid for. If the sites
domain name is www.mycompany.com, and you only
specify mycompany.com, the certificate will not be valid.
Email Address
administrator@yourcompany.com
3. After filling in the form (all fields are required), click Create.
A self-signed certificate based on the information you just provided is now
stored on the Matrix Manager.
4. Click Get CSR, and save the certificate file (csr.cer) to a convenient
location on your computer.
This is the file that you give to the third party CA to apply for their signed
SSL certificate.
5. After the CA sends you the certificate, save it to a convenient location on
your computer. Click Import to locate the file; then click Import to store
it on the Matrix Manager.
Note: When you upload the file, the Matrix Manager checks the file to make
sure the specified information still matches. If it does, the file is
accepted; if not, it is rejected.
If you want to remove the certificate (to replace it with a new one because of a
domain name change, for example), simply click Restore Defaults.
122
Preferences
Users can set individual preferences for their browser sessions on the
Preferences page. The Preferences page allows you to select options for the
user that is currently logged in.
Item
Description
Language
Toolbar Hotkey
Select the hotkey combination to call the Tool Bar function for
this user. The Tool Bar is used when accessing the computer
from the Transmitter or Receiver side.
Logout Timeout
If there is no user input for the amount of time set with this
function, the user is automatically logged out. A login is
necessary before the Matrix Manager can be accessed again.
The default is 30 minutes.
Screen Blanker
Welcome Page
123
Item
Password
Description
This section allows you to change the users password:
1. Key in your old password in the Old password field.
2. Key in your new password in the New password field.
3. Key in your new password again in the Confirm password
field.
124
Chapter 12
Preparation
1. From a computer that is not part of your KVM installation go to our
Internet support site and choose the model name that relates to your device
KE6900 / KE6940 to get a list of available Firmware Upgrade Packages.
2. Choose the Firmware Upgrade Package you want to install (usually the
most recent), and download it to your computer.
3. Be sure that the computer is connected to the same LAN segment as the
KE6900 / KE6940 devices.
125
Note: The screens shown in this section are for reference only.
2. Read the License Agreement (enable the I Agree radio button).
3. Click Next. The Firmware Upgrade Utility main screen appears:
126
4. The Utility inspects your installation. All the devices capable of being
upgraded by the package are listed in the Select Master Device list.
5. After you have made your device selection, Click OK and then Next to
begin the upgrade.
If you enabled Check Firmware Version, the Utility compares the devices
firmware level with that of the upgrade files. If it finds that the devices
version is higher than the upgrade version, it brings up a dialog box
informing you of the situation and gives you the option to Continue or
Cancel.
If you didnt enable Check Firmware Version, the Utility installs the
upgrade files without checking whether they are a higher level, or not.
As the Upgrade proceeds status messages appear in the Status Messages
panel, and the progress toward completion is shown on the Progress bar.
127
Upgrade Succeeded
After the upgrade has completed, a screen appears to inform you that the
procedure was successful:
128
129
130
Appendix
Safety Instructions
General
This product is for indoor use only.
Read all of these instructions. Save them for future reference.
Follow all warnings and instructions marked on the device.
Do not place the device on any unstable surface (cart, stand, table, etc.). If
the device falls, serious damage will result.
Do not use the device near water.
Do not place the device near, or over, radiators or heat registers.
The device cabinet is provided with slots and openings to allow for
adequate ventilation. To ensure reliable operation, and to protect against
overheating, these openings must never be blocked or covered.
The device should never be placed on a soft surface (bed, sofa, rug, etc.) as
this will block its ventilation openings. Likewise, the device should not be
placed in a built in enclosure unless adequate ventilation has been provided.
Never spill liquid of any kind on the device.
Unplug the device from the wall outlet before cleaning. Do not use liquid
or aerosol cleaners. Use a damp cloth for cleaning.
The device should be operated from the type of power source indicated on
the marking label. If you are not sure of the type of power available,
consult your dealer or local power company.
The device is designed for IT power distribution systems with 230V
phase-to-phase voltage.
To prevent damage to your installation it is important that all devices are
properly grounded.
The device is equipped with a 3-wire grounding type plug. This is a safety
feature. If you are unable to insert the plug into the outlet, contact your
electrician to replace your obsolete outlet. Do not attempt to defeat the
purpose of the grounding-type plug. Always follow your local/national
wiring codes.
Do not allow anything to rest on the power cord or cables. Route the
power cord and cables so that they cannot be stepped on or tripped over.
131
If an extension cord is used with this device make sure that the total of the
ampere ratings of all products used on this cord does not exceed the
extension cord ampere rating. Make sure that the total of all products
plugged into the wall outlet does not exceed 15 amperes.
To help protect your system from sudden, transient increases and
decreases in electrical power, use a surge suppressor, line conditioner, or
uninterruptible power supply (UPS).
Position system cables and power cables carefully; Be sure that nothing
rests on any cables.
Never push objects of any kind into or through cabinet slots. They may
touch dangerous voltage points or short out parts resulting in a risk of fire
or electrical shock.
Do not attempt to service the device yourself. Refer all servicing to
qualified service personnel.
If the following conditions occur, unplug the device from the wall outlet
and bring it to qualified service personnel for repair.
The power cord or plug has become damaged or frayed.
Liquid has been spilled into the device.
The device has been exposed to rain or water.
The device has been dropped, or the cabinet has been damaged.
The device exhibits a distinct change in performance, indicating a need
for service.
The device does not operate normally when the operating instructions
are followed.
Only adjust those controls that are covered in the operating instructions.
Improper adjustment of other controls may result in damage that will
require extensive work by a qualified technician to repair.
Do not connect the RJ-11 connector marked UPGRADE to a public
telecommunication network.
132
Appendix
Rack Mounting
Before working on the rack, make sure that the stabilizers are secured to
the rack, extended to the floor, and that the full weight of the rack rests on
the floor. Install front and side stabilizers on a single rack or front
stabilizers for joined multiple racks before working on the rack.
Always load the rack from the bottom up, and load the heaviest item in the
rack first.
Make sure that the rack is level and stable before extending a device from
the rack.
Use caution when pressing the device rail release latches and sliding a
device into or out of a rack; the slide rails can pinch your fingers.
After a device is inserted into the rack, carefully extend the rail into a
locking position, and then slide the device into the rack.
Do not overload the AC supply branch circuit that provides power to the
rack. The total rack load should not exceed 80 percent of the branch circuit
rating.
Make sure that all equipment used on the rack including power strips and
other electrical connectors is properly grounded.
Ensure that proper airflow is provided to devices in the rack.
Ensure that the operating ambient temperature of the rack environment
does not exceed the maximum ambient temperature specified for the
equipment by the manufacturer.
Do not step on or stand on any device when servicing other devices in a
rack.
133
Technical Support
International
For online technical support including troubleshooting, documentation,
and software updates: http://support.aten.com
For telephone support, See Telephone Support, page iii:
North America
Email Support
Online
Technical
Support
support@aten-usa.com
Troubleshooting
Documentation
Software Updates
Telephone Support
http://www.aten-usa.com/support
When you contact us, please have the following information ready beforehand:
Product model number, serial number, and date of purchase.
Your computer configuration, including operating system, revision level,
expansion cards, and software.
Any error messages displayed at the time the error occurred.
The sequence of operations that led up to the error.
Any other information you feel may be of help.
134
Appendix
Specifications
Function
Connectors
KE6900T
Console Keyboard
Ports
Video
Mouse
Speaker
Mic.
RS-232
KVM
Ports
Power
LAN
Console Selection /
Config
Reset
LAN
Local
1 x Green
Remote
1 x Green
Keyboard / Mouse
Video
USB
DC 5V
DC 5V
Up to 1920 x 1200
Operating Temp.
050C
Storage Temp
Physical
Properties
2 x DVI-I Female
(White)
Power
Power Consumption
Environment
2 x DVI-I Female
(White)
Speaker
RS-232
Emulation
1 x DVI-I Female
(White)
Video
LEDs
KB / Mouse
Mic.
Switches
KE6940T
-2060C
Humidity
Housing
Metal
Weight
Dimensions
(L x W x H)
1.13 kg
1.15 kg
135
Function
Connectors
KE6900R
Console Keyboard
Ports
Video
Mouse
Speaker
Mic.
Switches
Emulation
Power
1 x DC Jack (Black)
LAN
OSD
1 x Pushbutton
Video
1 x Pushbutton
Graphics
1 x Pushbutton
Config
Reset
1 x Semi-recessed Pushbutton
LAN
1 (Green / Orange)
Power
1 x Blue
Local
1 x Green
Remote
1 x Green
Keyboard / Mouse
Video
USB
DC 5V
Operating Temp.
050C
-2060C
Humidity
Housing
Metal
Weight
Dimensions
(L x W x H)
136
DC 5V
Up to 1920 x 1200
Storage Temp
Physical
Properties
2 x DVI-I Female
(White)
Power Consumption
Environment
1 x DVI-I Female
(White)
RS-232
Console Selection /
LEDs
KE6940R
1.25 kg
1.25 kg
Appendix
IP Installer
From a client computer running Windows, an IP address for a transmitter or
receiver can be assigned with the IP Installer utility. The utility can be obtained
from the Download area of our website. Look under Driver/SW. After
downloading the utility to your client computer, do the following:
1. Unzip the contents of IPInstaller.zip to a directory on your hard drive.
2. Go to the directory that you unzipped the IPInstaller program to and run
IPInstaller.exe. A dialog box similar to the one below appears:
137
Trusted Certificates
Overview
When you try to log in to the device from your browser, a Security Alert
message appears to inform you that the devices certificate is not trusted, and
asks if you want to proceed.
The certificate can be trusted, but the alert is triggered because the certificates
name is not found on the Microsoft list of Trusted Authorities. You can ignore
the warning and click Yes to go on.
138
Appendix
Note: 1. The command should be entered all on one line (i.e., do not press
[Enter] until all the parameters have been keyed in).
2. If there are spaces in the input, surround the entry in quotes (e.g.,
ATEN International).
To avoid having to input information during key generation the following
additional parameters can be used:
/C /ST /L /O /OU /CN /emailAddress.
Examples
openssl req -new -newkey rsa:1024 -days 3653 -nodes -x509
-keyout CA.key -out CA.cer -config openssl.cnf -subj
/C=yourcountry/ST=yourstateorprovince/L=yourlocationor
city/O=yourorganiztion/OU=yourorganizationalunit/
CN=yourcommonname/emailAddress=name@yourcompany.com
openssl req -new -newkey rsa:1024 -days 3653 -nodes -x509
-keyout CA.key -out CA.cer -config openssl.cnf -subj
/C=CA/ST=BC/L=Richmond/O="ATEN International"/OU=ATEN
/CN=ATEN/emailAddress=eservice@aten.com.tw
139
Limited Warranty
ALTUSEN warrants this product against defects in material or workmanship for a period of one
(1) year from the date of purchase. If this product proves to be defective, contact ALTUSEN's
support department for repair or replacement of your unit. ALTUSEN will not issue a refund.
Return requests can not be processed without the original proof of purchase.
When returning the product, you must ship the product in its original packaging or packaging that
gives an equal degree of protection. Include your proof of purchase in the packaging and the RMA
number clearly marked on the outside of the package.
This warranty becomes invalid if the factory-supplied serial number has been removed or altered
on the product.
This warranty does not cover cosmetic damage or damage due to acts of God, accident, misuse,
abuse, negligence or modification of any part of the product. This warranty does not cover damage
due to improper operation or maintenance, connection to improper equipment, or attempted repair
by anyone other than ALTUSEN. This warranty does not cover products sold AS IS or WITH
FAULTS.
IN NO EVENT SHALL ALTUSEN'S LIABILITY EXCEED THE PRICE PAID FOR THE
PRODUCT. FURTHER, ALTUSEN SHALL NOT BE RESPONSIBLE FOR DIRECT,
INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES RESULTING
FROM THE USE OF THE PRODUCT, ITS ACCOMPANYING SOFTWARE, OR ITS
DOCUMENTATION. ALTUSEN SHALL NOT IN ANY WAY BE RESPONSIBLE FOR,
WITHOUT LIMITATION, LOSS OF DATA, LOSS OF PROFITS, DOWNTIME, GOODWILL,
DAMAGE OR REPLACEMENT OF EQUIPMENT OR PROPERTY, AND ANY EXPENSES
FROM RECOVERY, PROGRAMMING, AND REPRODUCTION OF ANY PROGRAM OR
DATA.
ALTUSEN makes no warranty or representation, expressed, implied, or statutory with respect to
its products, contents or use of this documentation and all accompanying software, and specifically
disclaims its quality, performance, merchantability, or fitness for any particular purpose.
ALTUSEN reserves the right to revise or update its product, software or documentation without
obligation to notify any individual or entity of such revisions, or update.
For details about extended warranties, please contact one of our dedicated value added resellers.
140
Index
A
Adding a New Device, 59
Adding Users, 86
B
Backup / Restore, 116
C
Components, 5
Configuring a Device, 69
Control Center
Screen Components, 50
User Interface, 27
Creating Groups, 89
D
Deleting a Device, 63, 73
Deleting groups, 90
Deleting user accounts, 88
Device Permissions
assigning, 95, 97
F
Filter, 113
Firmware
upgrading, 115
Firmware Upgrade, 125
Firmware upgrade recovery, 119
G
Groups
assigning users, 91, 93
creating, 89
Deleting, 90
Managing, 89
Modifying, 90
L
Log, 111
filter, 113
M
Maintenance, 115
Managing Groups, 89
Managing Users, 86
Modifying groups, 90
Modifying user accounts, 88
O
Online
Registration, iii
P
Password
System administrator, 38, 49
Port Access
filter log, 113
Preferences, 123
Private Certificates, 139
R
Rack mounting, 13, 15
Requirements
Operating Systems, 4
OS Support, 4
RoHS, ii
S
Safety Instructions
General, 131
Rack Mounting, 133
Self-signed certificates, 139
141
SJ/T 11364-2006, ii
Specifications, 135
System administrator password, 38,
49
System Requirements
Computers, 3
T
Tab bar, 52
Technical Support, 134
Telephone support, iii
Tree View, 51
Trusted Certificates, 138
U
Upgrade firmware, 115
User Interface, 27
Tab bar, 52
User Management, 85
User Notice, iii
User Preferences, 123
Users
Adding, 86
assigning to groups, 91, 93
Deleting, 88
Managing, 86
Modifying, 88
removing from groups, 92, 94
Users and Groups, 91
142